skip to main content
10.1145/2141622.2141684acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

Access controls for privacy protection in pervasive environments

Published:25 May 2011Publication History

ABSTRACT

Pervasive Environments (PE) collect and process a massive amount of person-related and sensitive information. Data collected by a single sensor is in most cases not adequate to provide premium services. Information gathered must rather be combined to offer real benefits. The fused data must be secured by access controls to ensure privacy of the users and their trust in PE with it. This work proposes an Object-oriented World Model (OOWM) as a central information source that is filled with information collected from intelligent sensors and can be accessed and manipulated by smart application devices. It is shown how privacy can be enforced in such a centralized component. Privacy requirements must be specified and enforced. Especially conflicts in different requirements, e. g., user- and operator-specific polices, is an open issue. Existing approaches for specification and enforcement of access controls are discussed. An XACML-based approach for privacy in PE is shown and an algorithm for combining privacy policies is presented.

References

  1. A. Anderson. extensible access control markup language (xacml) version 2.0 hierarchical resource profile of xacml v2.0, 2005.Google ScholarGoogle Scholar
  2. A. Bauer, T. Emter, H. Vagts, and J. Beyerer. Object oriented world model for surveillance systems. In P. Elsner, editor, Future Security: 4th Security Research Conference, pages 339--345. Fraunhofer Verlag, Oct. 2009.Google ScholarGoogle Scholar
  3. S. Benferhat, R. El Baida, and F. Cuppens. A stratification-based approach for handling conflicts in access control. In Proceedings of the eighth ACM symposium on Access control models and technologies, SACMAT '03, pages 189--195, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. ContentGuard Inc. Xrml version 2.0 technical overview, March 2002.Google ScholarGoogle Scholar
  5. L. Cranor, B. Dobbs, S. Egelman, G. Hogben, J. Humphrey, M. Langheinrich, M. Marchiori, M. Presler-Marshall, J. Reagle, M. Schunter, D. A. Stampley, and R. Wenning. The platform for privacy preferences 1.1 (p3p1.1) specification, November 2006.Google ScholarGoogle Scholar
  6. F. Cuppens, L. Cholvy, C. Saurel, and J. Carrere. Merging Regulations: analysis of a practical example, volume 16. John Wiley & Sons, 2001.Google ScholarGoogle Scholar
  7. D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4:224--274, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Y. Fischer and A. Bauer. Object-oriented sensor data fusion for wide maritime surveillance. In 2nd International Conference on Waterside Security, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  9. E. Krempel. Automatisches Identitätsmanagement zur Steigerung der Privatsphäre in intelligenten Überwachungssystemen. Studienarbeit, Lehrstuhl für Interaktive Echtzeitsysteme, Karlsruher Institut für Technologie, 2010.Google ScholarGoogle Scholar
  10. M. Langheinrich. A Privacy Awareness System for Ubiquitous Computing Environments. In UbiComp 2002: ubiquitous computing: 4th International Conference, page 237. Springer Verlag, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data, 1(1):3, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Montangero, S. Reiff-marganiec, and L. Semini. Logic-based detection of conflicts in appel policies. Technical report, Massachusetts Institute of Technology, 2007.Google ScholarGoogle Scholar
  13. Q. Ni, E. Bertino, J. Lobo, and S. B. Calo. Privacy-aware role-based access control. IEEE Security & Privacy, 7:35--43, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. OECD, editor. OECD guidelines on the protection of privacy and transborder flows of personal data. OECD Publishing, 268 edition, March 2003.Google ScholarGoogle Scholar
  15. Open Digital Rights Language ODRL Initiative. ODRL 1.1 specifications, August 2002.Google ScholarGoogle Scholar
  16. P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, Computer Science Laboratory, SRI International, 1998.Google ScholarGoogle Scholar
  17. A. Schmidt, M. Beigl, and H. Gellersen. There is more to context than location. Computers & Graphics, 23(6):893--901, 1999.Google ScholarGoogle Scholar
  18. A. Steinberg, C. Bowman, and F. White. Revisions to the JDL data fusion model. In Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, volume 3719, pages 430--441, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  19. E. Syukur. Methods for policy conflict detection and resolution in pervasive computing environments. In In Policy Management for Web workshop in conjunction with WWW2005 Conference, pages 10--14. ACM, 2005.Google ScholarGoogle Scholar
  20. H. Vagts and A. Bauer. Privacy-aware object representation for surveillance systems. In Advanced Video and Signal Based Surveillance (AVSS), 2010 Seventh IEEE International Conference on, pages 601--608, 292010-sept.1 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. H. Vagts and J. Beyerer. Security and privacy challenges in modern surveillance systems. In P. Elsner, editor, Future Security: 4th Security Research Conference, pages 94--116. Fraunhofer Verlag, Oct. 2009.Google ScholarGoogle Scholar
  22. H. Vagts, C. Bier, and J. Beyerer. Anonymization in intelligent surveillance systems. In New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on, pages 1--4, 2011.Google ScholarGoogle Scholar
  23. M. Yagüe. Survey on xml-based policy languages for open environments. Journal of Information Assurance and Security, 1:11--20, 2006.Google ScholarGoogle Scholar
  24. R. Yavatkar, D. Pendarakis, and R. Guerin. A Framework for Policy-based Admission Control. RFC 2753 (Informational), Jan. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Access controls for privacy protection in pervasive environments

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            PETRA '11: Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
            May 2011
            401 pages
            ISBN:9781450307727
            DOI:10.1145/2141622

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 25 May 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader